DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Certified Network Defender (CND) v3

Certified Network Defender (CND) v3

Comments
2 min read
HIPAA-Compliant Secret Management for .NET Healthcare APIs

HIPAA-Compliant Secret Management for .NET Healthcare APIs

Comments
10 min read
How to Prevent Data Loss in Cloud Storage: A Developer’s Checklist

How to Prevent Data Loss in Cloud Storage: A Developer’s Checklist

1
Comments
9 min read
Exploiting GraphQL Vulnerabilities: How Misconfigurations Can Lead to Data Leaks

Exploiting GraphQL Vulnerabilities: How Misconfigurations Can Lead to Data Leaks

Comments
1 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Papel do Desenvolvedor Back-End na Segurança Cibernética: Como Escrever Código Seguro

Papel do Desenvolvedor Back-End na Segurança Cibernética: Como Escrever Código Seguro

Comments
3 min read
AI Defense Strategies Against Adversarial Attacks: A Practical Comparison

AI Defense Strategies Against Adversarial Attacks: A Practical Comparison

1
Comments
3 min read
What Is Information Rights Management (IRM)?

What Is Information Rights Management (IRM)?

1
Comments
2 min read
Nmap Cheatsheet for Hackers

Nmap Cheatsheet for Hackers

3
Comments
2 min read
$25,000 Bug Bounty for a GraphQL Security Flaw!

$25,000 Bug Bounty for a GraphQL Security Flaw!

Comments
1 min read
How my Kid’s tablet turned me into a Cybersecurity Analyst

How my Kid’s tablet turned me into a Cybersecurity Analyst

Comments 1
2 min read
What to do if you forgot your SafeLine WAF login password?

What to do if you forgot your SafeLine WAF login password?

6
Comments
1 min read
What is Splunk Infrastructure Monitoring?

What is Splunk Infrastructure Monitoring?

Comments
3 min read
De LLM jailbreaking a 1-click session hijacking

De LLM jailbreaking a 1-click session hijacking

3
Comments
3 min read
Operation Golden Arches: A Playful Hacker's Deep Dive into McDonald's Deal Exploits

Operation Golden Arches: A Playful Hacker's Deep Dive into McDonald's Deal Exploits

2
Comments 1
4 min read
Scope of Cloud Security Solutions in 2025

Scope of Cloud Security Solutions in 2025

Comments
4 min read
Boas Práticas de Segurança e Qualidade no Terraform

Boas Práticas de Segurança e Qualidade no Terraform

1
Comments
3 min read
On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

On-Premise vs. Cloud Logging: Pros, Cons, and Use Cases

Comments
15 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
AWS WAF: Keeping Your Web Applications Secure

AWS WAF: Keeping Your Web Applications Secure

Comments
3 min read
Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

Web3 Operational Security: Lessons from the Bybit $1.4B Wallet Safe Hack

1
Comments 5
16 min read
Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Comments
6 min read
Setting up a pentest lab with an Android Phone and Kali Linux

Setting up a pentest lab with an Android Phone and Kali Linux

1
Comments
7 min read
Cyber Attacks

Cyber Attacks

Comments
2 min read
What Happens When Apps Collect Too Much User Data?

What Happens When Apps Collect Too Much User Data?

1
Comments
11 min read
loading...